Lucene search

K
cve[email protected]CVE-2024-3737
HistoryApr 13, 2024 - 5:15 p.m.

CVE-2024-3737

2024-04-1317:15:50
CWE-22
web.nvd.nist.gov
23
vulnerability
path traversal
remote attack
cym1102 nginxwebui up to 3.9.9
vdb-260576
nvd

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

6.8 Medium

AI Score

Confidence

Low

6.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

15.5%

A vulnerability was found in cym1102 nginxWebUI up to 3.9.9. It has been rated as critical. Affected by this issue is the function findCountByQuery of the file /adminPage/www/addOver. The manipulation of the argument dir leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260576.

Affected configurations

Vulners
Node
cym1102nginxwebuiMatch3.9.0
OR
cym1102nginxwebuiMatch3.9.1
OR
cym1102nginxwebuiMatch3.9.2
OR
cym1102nginxwebuiMatch3.9.3
OR
cym1102nginxwebuiMatch3.9.4
OR
cym1102nginxwebuiMatch3.9.5
OR
cym1102nginxwebuiMatch3.9.6
OR
cym1102nginxwebuiMatch3.9.7
OR
cym1102nginxwebuiMatch3.9.8
OR
cym1102nginxwebuiMatch3.9.9

CNA Affected

[
  {
    "vendor": "cym1102",
    "product": "nginxWebUI",
    "versions": [
      {
        "version": "3.9.0",
        "status": "affected"
      },
      {
        "version": "3.9.1",
        "status": "affected"
      },
      {
        "version": "3.9.2",
        "status": "affected"
      },
      {
        "version": "3.9.3",
        "status": "affected"
      },
      {
        "version": "3.9.4",
        "status": "affected"
      },
      {
        "version": "3.9.5",
        "status": "affected"
      },
      {
        "version": "3.9.6",
        "status": "affected"
      },
      {
        "version": "3.9.7",
        "status": "affected"
      },
      {
        "version": "3.9.8",
        "status": "affected"
      },
      {
        "version": "3.9.9",
        "status": "affected"
      }
    ]
  }
]

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

6.8 Medium

AI Score

Confidence

Low

6.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

15.5%

Related for CVE-2024-3737